BlackHoodie Interview: Building Community, Opportunity, & Confidence
hex-rays.com·21h
⚖️AI Governance
Flag this post
How drones are altering contemporary warfare
phys.org·21h
🔒MLSecOps
Flag this post
Moving V8 to only flat strings
docs.google.com·13h·
Discuss: Hacker News
🔒MLSecOps
Flag this post
Deleting Your Suspension is a Hilariously Dumb Thing to Do
autoblog.com·2d
compliance
Flag this post
I Work For an Evil Company, but Outside Work, I’m Actually a Really Good Person
mcsweeneys.net·1d·
Discuss: Hacker News
compliance
Flag this post
Digital Omnibus Leaked Proposals
zylstra.org·2d
🛡️Privacy Engineering
Flag this post
llms.txt: The Web’s Next Great Idea, Or Its Next Spam Magnet via @sejournal, @DuaneForrester
searchenginejournal.com·23h
⚖️AI Governance
Flag this post
Data Science Weekly – Issue 625
datascienceweekly.substack.com·13h·
Discuss: Substack
🔒MLSecOps
Flag this post
Installing an 84MB Hard Drive Into a PDP-11/44
hackaday.com·1d
compliance
Flag this post
We’re Repeating Cybersecurity’s Big Mistake, This Time With AI
thenewstack.io·19h
⚖️AI Governance
Flag this post
USN-7867-1: sudo-rs vulnerabilities
ubuntu.com·2d·
Discuss: Hacker News
🔒MLSecOps
Flag this post
Achieving Atomicity and Isolation in Concurrent Rust: Channels vs. Mutexes
dev.to·9h·
Discuss: DEV
compliance
Flag this post
Google sues cybercriminal group behind text phishing scams
cnbc.com·1d·
Discuss: Hacker News
compliance
Flag this post
Building Your Own VPC on Linux: A DevOps Love Story 💘🐧
dev.to·1d·
Discuss: DEV
🛡️Privacy Engineering
Flag this post
Evaluation Avoidance: How Humans and AIs Hack Reward by Disabling Evaluation Instead of Gaming Metrics
lesswrong.com·13h
🤖AI
Flag this post
Tell people as early as possible it's not going to work out
lesswrong.com·11h
compliance
Flag this post
How to Sync Anything: Building a Sync Engine from Scratch — Part 1
dev.to·2d·
Discuss: DEV
🛡️Privacy Engineering
Flag this post
MCP x Cursor PoC: Rogue MCP Servers, IDE Browsers, and Real Defenses
dev.to·19h·
Discuss: DEV
🔒MLSecOps
Flag this post
Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix
cybersecuritydive.com·1d
🔒MLSecOps
Flag this post
Exclusive | Chinese Hackers Used Anthropic’s AI to Automate Cyberattacks - The Wall Street Journal
news.google.com·20h
🤖AI
Flag this post